This provides the configuration guidelines for the Cisco Secure Access Control Server (ACS).
In case of Protected Extensible Authentication Protocol (PEAP), certificates are used in order to validate the server. The use of the root certificate on the client is only limited to the validation of the server. When the validate server certificate option is unchecked on the client, it does not try to validate the server, and the server is authenticated without any validation. But, when the option is checked, it explicitly checks for the root certificate on the client in order to validate the server.
Once the server is authenticated, the manner in which PEAP works remains the same in both the cases. For example, whether the validate server certificate is checked or unchecked, it is possible to install the root CA on each client or do not do so.
PEAP works in these two phases:
In the first phase, the end-user client authenticates Cisco Secure ACS. This requires a server certificate and authenticates Cisco Secure ACS to the end-user client, which ensures that the user or machine credentials sent in phase two are sent to a AAA server that has a certificate issued by a trusted CA. If the validate server certificate option is checked, the CA certificate for the CA that issued the Cisco Secure ACS server certificate is likely to be required in local storage for trusted root CAs on the end-user client computer. The first phase uses a TLS handshake in order to establish a Secure Socket Layer (SSL) tunnel.
In phase two, Cisco Secure ACS authenticates the user or machine credentials with an EAP authentication protocol. The EAP authentication is protected by the SSL tunnel that is created in phase one.
Since data encryption takes place with the SSL in PEAP, there is no way to see the use of certificates in case of PEAP authentication.
Note: In order to avoid a Man in the middle attack, configure this with validate server certificate checked.
In order to make use of the validate server certificate option, install Root CA and Intermediate CA both on the ACS server and on each client.
While it is installed on the client, save Root CA to the Root CA store and store the Intermediate CA at the Subordinate CA store location.
I am using asdm-openjre-7141-48.bin in Cisco 5508.icedtea-web-1.7.1-1.el7.x86_64 and java-1.8.0-openjdk-220.127.116.11-7.b13.el7.x86_64 are installed on my CentOS 7 After execution of "javaws https://10.49.10.91/admin/public/asdm.jnlp" the login screen ap...
Hi Everyone I am trying to Create an Internal User with cURL and JSON on window command prompt for cisco ise. prompt but I am get these errors over again . can anyone help me outthis is curl command curl --insecure --inclu...
Hi to all, i would like to know if there is a safe way to categorize Cisco IP phones with a seperate (from PCs) authorization po;icy but without the use of ISE PLUS licences. Is that possible? For example :IP Phone with MAB --> Voice Dom...
Hello, I am using API (xml/json) to change parameters of authorization profile in ISE. All good (VLAN, dACL,...), except attribute "RADIUS_ACCEPT" or "RADIUS_REJECT". This object doesn't change, even it is in documentation as supported value.ISE 2.7 Patch...